General
-
Target
5385333a8618dac516b8b33b0bbf11a1.bin
-
Size
640KB
-
Sample
240425-bxptxsda5y
-
MD5
f0505480512572c677358037194bd66d
-
SHA1
ac7e3debef6a0dc222daaa03cda11134481bf487
-
SHA256
a5e7d66304e43f1ea62119d763a4ea996b04599299e13beba53537285468bd89
-
SHA512
8bd6bc713e6c0e131c538275e0bb5a603add7c16f79da5a21c25aab04ab103c4b2d4692900900c5baca23a5ca10535b5466ecca94f98364c4642190fc90113b3
-
SSDEEP
12288:yT95J0Zis6wNhjTR4qzrT/eekQHqlX8V1Xa9lcP3u6vgXX3V76+Fqet7pAbft:4n0ksXhjTR4iBkQHeXuXa9lKZvu3t6+k
Static task
static1
Behavioral task
behavioral1
Sample
6c06c665c435cf95787310f59e984006711d50bf091ae610cb4440abae1448c4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6c06c665c435cf95787310f59e984006711d50bf091ae610cb4440abae1448c4.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.starmech.net - Port:
587 - Username:
[email protected] - Password:
nics123 - Email To:
[email protected]
Targets
-
-
Target
6c06c665c435cf95787310f59e984006711d50bf091ae610cb4440abae1448c4.exe
-
Size
669KB
-
MD5
5385333a8618dac516b8b33b0bbf11a1
-
SHA1
3a1171327abe7aefeb85914afae6ec6c8bfbe6e0
-
SHA256
6c06c665c435cf95787310f59e984006711d50bf091ae610cb4440abae1448c4
-
SHA512
0392fd0fc5f79b8c19655d279e882bf7cd83a4d841d1bf1f1845997396368734866f47d06c19fa0da48ecc305d2113611f65153e07ff6aae0c99a8137e9e3cea
-
SSDEEP
12288:x4WzE3RYDR05N+rTd2/6pjhHyKj1jb9WKhsq9Q/V8pekTGzd2S96QKNe:1WR03BAWj0Kj17YV8petwsK
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-